Understanding Keys and Passwords Used by the TPM

The Trusted Platform Module (TPM) makes extensive use of
asymmetric key pairs, often called "public-private key pairs." The
private key is kept secret, and the corresponding public key can be
widely distributed.

Topics in this section discuss some of the most important keys
used by the TPM security hardware, and also discuss the owner
password. This section includes the following topics: